TechHive: British spies reportedly spoofed LinkedIn, Slashdot to target network engineers

TechHive
TechHive helps you find your tech sweet spot. We guide you to products you'll love and show you how to get the most out of them. 
Economist GMAT Tutor.

The results you want. The flexibility you need. Claim your 7-day free trial today.
From our sponsors
thumbnail British spies reportedly spoofed LinkedIn, Slashdot to target network engineers
Nov 11th 2013, 13:35, by Lucian Constantin, IDG News Service

British intelligence agency Government Communications Headquarters (GCHQ) reportedly used spoofed LinkedIn and Slashdot pages to compromise the computers of network engineers working for global roaming exchange providers based in Europe.

Special teams from GCHQ's My Network Operations Centre (MyNOC) division identified key employees doing network maintenance and security at the targeted companies and determined which of them were users of LinkedIn or Slashdot.org. The teams then directed the targeted individuals to fake versions of those sites which contained malicious code designed to install malware on their computers, German magazine Der Spiegel reported based on secret GCHQ documents leaked by former U.S. National Security Agency (NSA) contractor Edward Snowden.

The technology used for these computer infiltration operations is called "Quantum Insert" and according to past media reports it was also used by the NSA.

GCHQ used this system to target network engineers from Belgian telecommunications provider Belgacom as part of an operation called "Socialist," as well as the employees of "international mobile billing clearinghouses" as part of a separate operation called "Wylekey," Der Spiegel reported.

To read this article in full or to leave a comment, please click here

You are receiving this email because you subscribed to this feed at blogtrottr.com.

If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions
Previous
Next Post »